Return to Article Details An Effective Malicious Node Detection Scheme for Adaptive Data Fusion under Time-Varying Byzantine Attack Download Download PDF